{"id":"CVE-2025-68746","summary":"spi: tegra210-quad: Fix timeout handling","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Fix timeout handling\n\nWhen the CPU that the QSPI interrupt handler runs on (typically CPU 0)\nis excessively busy, it can lead to rare cases of the IRQ thread not\nrunning before the transfer timeout is reached.\n\nWhile handling the timeouts, any pending transfers are cleaned up and\nthe message that they correspond to is marked as failed, which leaves\nthe curr_xfer field pointing at stale memory.\n\nTo avoid this, clear curr_xfer to NULL upon timeout and check for this\ncondition when the IRQ thread is finally run.\n\nWhile at it, also make sure to clear interrupts on failure so that new\ninterrupts can be run.\n\nA better, more involved, fix would move the interrupt clearing into a\nhard IRQ handler. Ideally we would also want to signal that the IRQ\nthread no longer needs to be run after the timeout is hit to avoid the\nextra check for a valid transfer.","modified":"2026-03-31T17:29:25.809322Z","published":"2025-12-24T12:09:42.213Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:10039-1","openSUSE-SU-2026:10301-1","openSUSE-SU-2026:20145-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68746.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/01bbf25c767219b14c3235bfa85906b8d2cb8fbc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/551060efb156c50fe33799038ba8145418cfdeef"},{"type":"WEB","url":"https://git.kernel.org/stable/c/83309dd551cfd60a5a1a98d9cab19f435b44d46d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/88db8bb7ed1bb474618acdf05ebd4f0758d244e2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b4e002d8a7cee3b1d70efad0e222567f92a73000"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bb0c58be84f907285af45657c1d4847b960a12bf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c934e40246da2c5726d14e94719c514e30840df8"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68746.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68746"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"921fc1838fb036f690b8ba52e6a6d3644b475cbb"},{"fixed":"88db8bb7ed1bb474618acdf05ebd4f0758d244e2"},{"fixed":"83309dd551cfd60a5a1a98d9cab19f435b44d46d"},{"fixed":"c934e40246da2c5726d14e94719c514e30840df8"},{"fixed":"551060efb156c50fe33799038ba8145418cfdeef"},{"fixed":"bb0c58be84f907285af45657c1d4847b960a12bf"},{"fixed":"01bbf25c767219b14c3235bfa85906b8d2cb8fbc"},{"fixed":"b4e002d8a7cee3b1d70efad0e222567f92a73000"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68746.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.12.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.160"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.63"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.13"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.18.0"},{"fixed":"6.18.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68746.json"}}],"schema_version":"1.7.5"}